cybersecsi / invisible-backdoor-detectorLinks
A quick script to spot the usage of Unicode Bidi (bidirectional) characters that could lead to an Invisible Backdoor
☆34Updated 3 years ago
Alternatives and similar repositories for invisible-backdoor-detector
Users that are interested in invisible-backdoor-detector are comparing it to the libraries listed below
Sorting:
- ☆42Updated 8 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Local Privilege Escalation Miner☆31Updated 3 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 2 months ago
- URL fingerprinting made easy☆89Updated last year
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 3 weeks ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated last month
- Central IoC scanner based on Loki☆20Updated 4 years ago
- ☆26Updated 3 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆70Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- ☆16Updated 2 years ago
- A DMARC scanning and parsing tool.☆33Updated 8 months ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago